 |
|
|
|
|
 Digital Asset Management
My interest in this subject started when I joined the broadcast equipment manufacturer,
Chyron. For a few years I was the product manager for their playout automation and
asset management product lines. These were one of the first applications that gave
television broadcasters the means to manage the ingest, storage, archiving, and... |  |  Design of Hashing Algorithms (Lecture Notes in Computer Science)
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the... |  |  PHP Ajax Cookbook
Ajax is the necessary paradigm in Web 2.0 sites. Most Web 2.0 sites are built with PHP and Ajax. Extending Ajax is about delivering front-end services for accessing back-end services in PHP in a quick and easy manner. With this book in hand, you will learn how to use the necessary tools for Ajaxification of websites and iPhones.
... |
|
| Result Page: 791 790 789 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 |